-
Social media isn't just a marketing channel you bolt on to your current plans. You need to understand its true business-wide impact. How should your IT organization prepare to embrace social media over the next 12 months?
-
Consultancy finds flaws in cloud infrastructure that may expose your data to other users of the same service.
-
Enhanced Software Assurance licensing may be more expensive or may restrict existing benefits.
-
Conficker worm will continue to trouble IT despite lack of new variants in two years.
-
Don't just deliver bad data faster. Improve data in real time.
-
Knowing how to get started is key to building a successful project -- and obtaining the funding to get the project off the ground.
-
QlikTech's Donald Farmer discusses how mobile technologies are fundamentally changing BI, sometimes in ways you might not expect.
-
This month, Dell pulled the trigger on two significant acquisitions. What's behind Dell's acquisition moves, and why does at least one of them seem like a no-brainer?
-
These three rules of thumb will help you avoid the risk of keeping corporate data forever (and ever).
-
A certification program backed by CA Technologies may help supply IT’s next generation of trained professionals.
-
Four reasons why virtualization, not cloud computing, is changing the ground rules used to design traditional performance management systems and why your enterprise needs to consider new virtualization-aware approaches to performance management.
-
Impacts of rights mismanagement; programmers connect on new network; VDI projects popular but troubled.
-
Why are so many data integration players selling enterprise service buses of their own? Is it just a matter of vendor opportunism?
-
The search for BI insight already has a game-like feel to it. Advocates of "gamification" want to amplify this effect and immerse BI users in their task.
-
Data governance is more than just managing data in order to optimize outcomes.
-
ODBC was a revolutionary technology 20 years ago. We look at its past and present, and suggest where it's headed.
-
Malware, as Microsoft could have told Apple, comes with the territory. Last year saw a surge in Mac-related malware; 2012 has sustained that trend in a big way.
-
Innovative, multi-level authentication measures are critical. Companies that use inventive ways to incorporate current technology to safeguard their information will ultimately come out on top.
-
How standards are driving organization value and how they benefit IT.
-
-
Companies expect to hire more IT workers this quarter, but not as aggressively as they did in the first quarter of the year, despite their optimism about growth.
-
Symantec reflects on Flashback lessons learned, releases free removal tool; IT not prepared for disasters.
-
Company says survey reflects how disaster recovery and service availability "remain a back-office secret."
-
Malicious packet volume shows sharp increase.
-
This three-step approach will help you establish or reenergize your DI development projects.